Simplified pricing for Microsoft Sentinel

Simplified pricing for Microsoft Sentinel

Microsoft Sentinel, Microsoft's SIEM/SOAR solution, uses an Azure Log Analytics Workspace as it's backend and as such previously the pricing of sentinel was split between the Log Analytics Workspace and the Sentinel Service. This month (July 2023) Microsoft has been rolling out a simplified pricing for new Sentinel Workspaces. As...

Azure AD becomes Microsoft Entra ID

Azure AD becomes Microsoft Entra ID

Another day and another round of Microsoft product name changes - this time Azure AD and related products are being aligned with the Microsoft Entra product family name. The Microsoft Entra product family was announced in May 2022 as packaging together of all the Microsoft identity and access products, including...

Split Screen Browsing in Edge

Split Screen Browsing in Edge

So often I arrange two browser windows side-by-side when working with multiple websites (as always). But no more! I just found that in Microsoft Edge one can split the browser window. To achieve this: Type edge://flags/#edge-split-screen in the address bar Enable Microsoft Edge Split Screen Restart Edge Once you've done...

Stop Giving Me Back My Time!

When meetings conclude early, the term “Let me give you back 10 minutes of your life” to wrap things up, always make me cringe. Focussing on ‘giving back’ implies that the time was somehow ‘taken’ from the attendees. It implies loss, as if the meeting was burdensome or unnecessary. Assuming...

What is Vulnerability Management and the Microsoft Defender Vulnerability Management tools

What is Vulnerability Management and the Microsoft Defender Vulnerability Management tools

Vulnerability Management tools help identify, categorise, and manage vulnerabilities in IT systems. This can include unsecure configurations; missing updates, patches or other security-related updates for applications, services, and operating systems whether on-prem or cloud based. The Center for Internet Security (CIS) lists continuous vulnerability management as one of the Critical...

CIS Security Controls and Compliance

The Center for Internet Security is a nonprofit entity whose mission is to 'identify, develop, validate, promote, and sustain best practice solutions for cyberdefense.' It draws on the expertise of cybersecurity and IT professionals from government, business, and academia from around the world. To develop standards and best practices, including CIS benchmarks,...

Cyber Security Acronyms

To clarify the ever-increasing number of acronyms in the cyber security space I have started curating this list of definitions and links to articles. CASB = Cloud Access Security Broker A cloud access security broker (CASB) is a security policy enforcement point positioned between enterprise users and cloud service providers....

Page 2 of 12 1 2 3 12

Popular Posts

No Content Available